[Snort-sigs] FakeUpdates campaign sig

Y M snort at outlook.com
Fri Apr 27 10:19:55 EDT 2018


Hi,

I skipped signatures for the redirection and just focused on the final payload request. No pcaps available for this one.

# Title: Fakeupdates Campaign
# Reference: https://blog.malwarebytes.com/threat-analysis/2018/04/fakeupdates-campaign-leverages-multiple-website-platforms/

alert tcp $HOME_NET any -> $EXTERNAL_NET $HTTP_PORTS (msg:"MALWARE-CNC FakeUpdates campaign final payload request"; flow:to_server,established; content:"POST"; http_method; urilen:8; content:"/1x1.png"; fast_pattern:only; http_uri; content:"auth255|3A 20|login|0D 0A|"; http_header; content:"Accept|3A 20|*/*|0D 0A|"; http_header; content:"="; offset:1; http_client_body; metadata:ruleset community, service http; reference:url,blog.malwarebytes.com/threat-analysis/2018/04/fakeupdates-campaign-leverages-multiple-website-platforms/; classtype:trojan-activity; sid:8000008; rev:1;)

Thanks.
YM
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.snort.org/pipermail/snort-sigs/attachments/20180427/247b39eb/attachment.html>


More information about the Snort-sigs mailing list